Summary
The remote sendmail server, according to its version number, may be vulnerable to a remote buffer overflow allowing remote users to gain root privileges.
Sendmail versions from 5.79 to 8.12.7 are vulnerable.
Solution
Upgrade to Sendmail ver 8.12.8 or greater or
if you cannot upgrade, apply patches for 8.10-12 here:
http://www.sendmail.org/patchcr.html
NOTE: manual patches do not change the version numbers.
Vendors who have released patched versions of sendmail may still falsely show vulnerability.
*** OVS reports this vulnerability using only
*** the banner of the remote SMTP server. Therefore, *** this might be a false positive.
see http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950 http://www.cert.org/advisories/CA-2003-07.html
http://www.kb.cert.org/vuls/id/398025
Severity
Classification
-
CVE CVE-2001-1349, CVE-2002-1337 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
- Sendmail Local Starvation and Overflow
- SpamAssassin Milter Plugin 'mlfi_envrcpt()' Remote Arbitrary Command Injection Vulnerability
- McAfee GroupShield for Exchange X-Header Security Bypass Vulnerability
- Generic SMTP overflows